Questions:
- Do ITACS students represent information security vulnerabilities to Temple University, each other, or both? Explain your answer.
- Is information security a technical problem, a business problem that the entire organization must frame and solve, or both? Explain your answer.
- What challenges are involved in performing a quantitative information security risk analysis?